NASA Scientific and Technical Aerospace Reports
NASA Scientific and Technical Aerospace Reports
NASA Scientific and Technical Aerospace Reports
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
signal-processing algorithms, allows the scheduling <strong>and</strong> resource allocation to be done at compile time, rather than at run time<br />
as in usual data flow systems. Therefore hardware requirements can be kept low. Because of the special kind of algorithms<br />
we are dealing with, it is possible to use techniques from the field of operations research for i. the evaluation of the minimum<br />
computation time exploiting the inherent parallelism of a given algorithm <strong>and</strong> ii. the schedule optimization under limited<br />
resources or other resource constraints.<br />
Author<br />
Parallel Processing (Computers); Architecture (Computers); Signal Processing; Signal Analyzers; Information Flow;<br />
Operations Research<br />
20060002184 Concordia Univ., Montreal, Quebec, Canada<br />
Structure of the Submarking Reachability Problem <strong>and</strong> Network Programming<br />
Thulasiraman, K.; Comeau, Marc A.; 1987 IEEE International Symposium on Circuits <strong>and</strong> Systems, Volume 2; 1987,<br />
pp. 487-490; In English; See also 20060002103; Copyright; Avail.: Other Sources<br />
Using a linear programming formulation, a solution to the submarking reachability problem for marked graphs is<br />
presented. In both capacitated <strong>and</strong> uncapacitated cases the problem reduces to that of testing feasibility of the dual<br />
transshipment problem of operations research. An algorithm called REACH is presented for the feasibility testing problem <strong>and</strong><br />
its worst-case time complexity is O(mn), where m <strong>and</strong> n are, respectively, the number of edges <strong>and</strong> the number of nodes in<br />
the marked graph.<br />
Author<br />
Linear Programming; Computer Networks; Algorithms; Operations Research; Feasibility<br />
20060002286 Mitre Corp., USA<br />
Evaluations of Sana <strong>and</strong> Cisco Host Intrusion Prevention Systems (HIPS)<br />
Coover, Edwin R.; Thomson, Duncan; Proceedings of the Fifth Integrated Communications, Navigation, <strong>and</strong> Surveillance<br />
(ICNS) Conference <strong>and</strong> Workshop; November 2005, pp. 1-31; In English; See also 20060002231; Original contains color<br />
illustrations<br />
Contract(s)/Grant(s): DTFA01-01-C-00001; No Copyright; Avail.: CASI: A03, Hardcopy; Available from CASI on CD-ROM<br />
only as part of the entire parent document<br />
This report was undertaken as part of CAASD’s Information Security Systems (ISS) technology research for the Federal<br />
Aviation Administration’s (FAA) National Airspace System (NAS). The evaluation of Host Intrusion Prevention Systems<br />
(HIPS) was one part of a broader investigation in assessing the potential for an ‘adaptive quarantine,’ whereby a wide variety<br />
of attacks on NAS networks <strong>and</strong> computers could be identified, isolated <strong>and</strong> defeated. Sana’s assessment was that<br />
anomaly-based product required ‘training’ in what was expected to be ‘normal’ patterns, primary response generated many<br />
false alerts (Type 1 errors). Sana also failed to catch a number of known Solaris exploits (Type II errors) One of these failures<br />
was due to the fact that they were running an early version of Solaris 8. MITRE concluded that Sana’s product was immature;<br />
not recommended for an FAA pilot implementation. CASA’s assessment was that like Sana’s Primary Response, there are<br />
coverage issues, with CSA currently limited to Windows, Solaris <strong>and</strong> Linux. CSA is extremely complex with literally hundreds<br />
of rule <strong>and</strong> configuration options. CSA passed all CAASD tests. CAASD believes that CSA is worthy of being called a<br />
‘Host-based Intrusion Prevention System’ (HIPS).<br />
Derived from text<br />
Intrusion; Prevention; Warning Systems; Computer Programming; Protection<br />
20060002289 Frequentis G.m.b.H., Vienna, Austria<br />
SIP Based Communications in Netcentric Operations<br />
Prinz, Johannes; Kampichler, Wolfgang; Kurth, Christoph; Osrael, Johannes; Proceedings of the Fifth Integrated<br />
Communications, Navigation, <strong>and</strong> Surveillance (ICNS) Conference <strong>and</strong> Workshop; November 2005; 18 pp.; In English; See<br />
also 20060002231; Original contains color illustrations; No Copyright; Avail.: CASI: A03, Hardcopy; Available from<br />
CASI on CD-ROM only as part of the entire parent document<br />
Netcentric Operations is a buzz word emerging from the defense community. It refers to an operational concept which<br />
is based on having the same level of service literally from anywhere. Although being an operational concept. netcentric<br />
operations heavily rely on powerful technical solutions for information exchange <strong>and</strong> service architecture. The latest<br />
development showed that IP-solutions are also going to exp<strong>and</strong> into the area of safety critical voice communication systems.<br />
This paper elaborates two aspects of the implications of introducing IP based communication systems on a system <strong>and</strong><br />
140